c# Programming Glossary: malicious
How do I make the website execute links? http://stackoverflow.com/questions/11329757/how-do-i-make-the-website-execute-links that handle URL protocols must consider how to respond to malicious data. Because handler applications can receive data from untrusted.. parameter values passed to the application may contain malicious data that attempts to exploit the handling application. This..
How to pass the smart screen on Win8 when install a signed application? http://stackoverflow.com/questions/12311203/how-to-pass-the-smart-screen-on-win8-when-install-a-signed-application EV code signing certificates. Don ™t sign or distribute malicious code Distributing code detected as malicious will remove the.. or distribute malicious code Distributing code detected as malicious will remove the reputation from a file and also any reputation..
Dynamically created SQL vs Parameters in SQL Server http://stackoverflow.com/questions/1608522/dynamically-created-sql-vs-parameters-in-sql-server a integer and thus should not really be possible to inject malicious code. My question is this Do you use option 1 in production..
Virtual Navigation Properties and Multi-Tenancy http://stackoverflow.com/questions/19826316/virtual-navigation-properties-and-multi-tenancy This is your mass assignment protection which ensures a malicious user can't craft a request that would otherwise link an entity..
ASP.NET request validation causes: is there a list? http://stackoverflow.com/questions/2200788/asp-net-request-validation-causes-is-there-a-list documents the conditions used to determine a potentially malicious input string That's what I'm looking for. EDIT 2 @Chris Pebble..
Detecting honest web crawlers http://stackoverflow.com/questions/544450/detecting-honest-web-crawlers side which requests are from bots. I don't care about malicious bots at this point just the ones that are playing nice. I've..
In .NET 4.0, how do I 'sandbox' an in-memory assembly and execute a method? http://stackoverflow.com/questions/5997995/in-net-4-0-how-do-i-sandbox-an-in-memory-assembly-and-execute-a-method in a separate process to ensure that scripts that do malicious or just stupid things like stack overflows fork bombs and out..
Calling CreateProcessAsUser from C# http://stackoverflow.com/questions/668389/calling-createprocessasuser-from-c-sharp Catch any exception thrown here so as to prevent any malicious program operating within the security context of the logged..
Which exceptions shouldn't I catch? http://stackoverflow.com/questions/7152354/which-exceptions-shouldnt-i-catch all possible causes of an exception and ensure that malicious code cannot exploit the resulting application state you should..
Do you say No to C# Regions? [closed] http://stackoverflow.com/questions/755465/do-you-say-no-to-c-sharp-regions big chunks of code around ever heard of a subroutine Hide malicious or back door code that lazy reviewers don't ask about. 3. Then..
Which cryptographic hash function should I choose? http://stackoverflow.com/questions/800685/which-cryptographic-hash-function-should-i-choose normal situations when you use the MD5 algorithm with no malicious intent and no third party has any malicious intent would you.. with no malicious intent and no third party has any malicious intent would you expect ANY collisions meaning two arbitrary.. size is the same as SHA1. What are the odds of getting non malicious collisions when hashing file names or other short strings Eg...
Why is JsonRequestBehavior needed? http://stackoverflow.com/questions/8464677/why-is-jsonrequestbehavior-needed parameter to the Json method. However there is a chance a malicious user can gain access to the JSON payload through a process known..
SQL Permissions to Add data and how to verify? http://stackoverflow.com/questions/962482/sql-permissions-to-add-data-and-how-to-verify Now I'm not 100 worried about the user from injecting malicious data though it would be nice to stop that but it's an internal..
|